The Utah Data Center Put Legislative Context
To some, there has been a steady erosion of the civil liberties of Americans. To these people, there has been a dramatic increase in the surveillance of every day life by law enforcement and intelligence agencies. As most Americans know and certainly many people around the world also know, America is a very different place after the attacks of 9/11 than it was before. Nevertheless, the trend towards increased surveillance and control by law enforcement and the intelligence community was there.
Pre-9/11 Legislation
Even before 9/11 there were moves by the executive branch to have warrantless surveillance of groups suspected of acts of violence, including the destruction of government property. This is underscored with the Keith decision (United States v. United States District Court (Keith) 407 U.S. 297 [1972]) where this idea was rejected by the Supreme Court,

This court affirmed the appellate court’s decision, finding that the internal security concerns articulated by the government did not validate electronic surveillance without a court order.

Surveillance of Wire, Oral and Electronic Communication - the patriot act expanded the serious crimes that would be eligible for wiretapping including chemical weapons offenses, use of weapons of mass destruction, violent acts of terrorism transcending national borders, financial transactions with countries that suport terrorism and material suport of terrorist organizations. It also expanded how the FISA court would apply. No crime of illegal transportation of weapons was required, and "probable cause" required. Instead the President, through the Attorney General, may authorize electronic surveillance without a court order.

Physical Searches - physical searches are permitted only if foreign intelligence is a "significant purpose" rather then the sole purpose.

Streamlining Surveillance Powers - Section 206 allows for roving surveillance of and eliminates the need for a new FISA order every time a subject changes location. Roving wiretaps assign the surveillance to a person, rather than a device. Also, under the Act, if assistance is needed in obtaining surveillance, a gag order may be placed on that request for assistance when "the Court finds that the actions of the target of the application may have the effect of thwarting the identification of a specified person."

The Purpose & Dimensions of the Utah Center
This center will collect information. A lot of it. In most articles about this center Bamford is prominently quoted.

Yet Bramford is not the only person who has described ways in which the intelligence community uses this information gleaned from the internet and phone calls. Some example are "entity extraction" and "relationship extraction." Software programs like Catalyst, serve as a good example.

The intelligence community has been working for years to develop software and analytical frameworks capable of large-scale data analysis and extraction. Technological advances have now made it possible for spy agencies to not just capture the incredible amount of data flowing through public and private networks around the world, but to parse, contextualize and understand the intelligence that is being gathered. Automated software programs are now capable of integrating data into semantic systems, providing context and meaning to names, dates, photographs and practically any kind of data you can imagine.

The report goes on to explain how the CIA, Office of Naval Intelligence the NSA use their own programs that try to do similar things.

Many agencies within the intelligence community have already created systems to do this sort of semantic integration. The Office of Naval Intelligence uses a system called AETHER “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns.” The NSA runs a program called APSTARS that provides “semantic integration of data from multiple sources in support of intelligence processing.” The CIA has a program called Quantum Leap that is designed to “find non-obvious linkages, new connections, and new information” from within a dataset. Several similar programs were even initiated by ODNI including BLACKBOOK and the Large Scale Internet Exploitation Project (LSIE).

Yet this program Catalyst may be just the kind of program that may unify all these other attempts and may be the one that will be used in the Data Center.

Catalyst is an attempt to create a unified system capable of automatically extracting complex information on entities as well as the relationships between them while contextualizing this information within semantic systems. According to its specifications, Catalyst will be capable of creating detailed histories of people, places and things while mapping the interrelations that detail those entities’ interactions with the world around them. A study conducted by IARPA states that Catalyst is designed to incorporate data from across the entire intelligence community, creating a centralized repository of available information gathered from all agencies...

The cost of this center, which is the first of the centers being built by a Presidential executive order named National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23) signed by President Bush in 2008. The Obama Administration followed up on this order by authorizing the construction of this facility. The total construction costs will be $2 billion. In July of 2009 President Obama signed a bill that included $181 million to begin the "...preparatory construction of the Camp Williams (this is the name the Utah Center has tentatively received) facility." The Official name of this facility is the Community Comprehensive National Cybersecurity Initiative Data Center. This initiative is part of Comprehensive National Cybersecurity Initiative approved by President Obama. The document explains,

In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.

The center will bring anywhere from 5,000-10,000 construction jobs to Utah. It will employ 100-200 highly paid personnel to the center. This center will add to the center that is already in Fort Meade, Maryland that has been there for years. In 2006, the Baltimore Sun reported that the NSA could not expand that facility anymore due to the lack of electrical generation by the Baltimore Gas & Electric's maxed out local grid. Indeed, the center will be the largest data center in the world, with the largest supercomputer ever built. The computer will use 65 Megawatts of power, equal to the entire city of Salt Lake in Utah. It will take $40 million a year just for energy costs.

In our last installment in this series we will discuss the power of this computer and how it is defended by those who support it.

245 comments:

[b][url=http://www.greatlouisvuittonhandbags.co.uk/]www.greatlouisvuittonhandbags.co.uk[/url][/b] This blotchiness can direct have an effect on your overall look and self esteem. Melasma and also other hyperpigmentation problems tend to be due to hormonal problems that could surface during or just after pregnancy and can also be a result of in excess of exposure on the daylight. Whatever the trigger, most ladies are nervous to uncover an answer..

[b][url=http://www.cheapuggsoutletstore.co.uk/]www.cheapuggsoutletstore.co.uk[/url][/b] When you have at seem over the internet then it will not require really extensive for you personally to discover an awesome selection of pirates' costumes. You'll be able to maintain your apparel somewhat simple or else you can definitely head to city with it. Specific elements, on the other hand, are essential when dressing-up; there is the hat or bandana (with or with out a 'Jolly Roger') as well as the eye patch.In subsequent content pieces, we'll show you the varied rail museums and railfan groups that happen to be around and may immediate you how to obtain into these groups and enjoy them. Don't forget also that railfanning is usually a solitary sport which you can do on your own, but is hundreds additional pleasurable after you can perform it by belonging to the team. You may even start or participate in an on line convention place, in which rail lovers round the environment can get to share thoughts and show off their photographic do the job.

[b][url=http://www.cheapuggsoutletstore.co.uk/]uggs outlet[/url][/b] Just this sort of as what Jessica Simpson mentioned: "You cannot have ample Louis Vuitton. There exists often yet another piece you do not have but should really possess. " Jessica Simpson People Spring 2005You cannot blame these persons for seeking, in addition to needing to look fashionable and great.Excellent debate tactics aren't primarily based only on exploring. The style where you converse will make a large variance in winning about an viewers. Wonderful speakers are recognised for their power to feel on their toes with out punctuating their speech with "like" and "um." Having a fantastic expertise in the English language is likewise a good approach to improve your argument.

[b][url=http://www.cheapuggsoutletstore.co.uk/]uggs outlet[/url][/b] Not too long ago, Sparks has just launched the 10th e-book while in the sequence, Vampire Lifeless, that has a fascinating and captivating plot. Connor, a vampire who's committed to not committing precisely the same romantic relationship faults as his friends did, meets a fallen angel who little by little falls in really like with the vampire. To be the succ .

[b][url=http://www.louisvuittonwalletsmarket.com/]louis vuitton wallets[/url][/b] Centration is outlined since the utmost allowable deviation concerning the optical and mechanical axes for the spherical lens. The optical axis is outlined given that the line connecting the facilities of curvatures of both equally lens surfaces. The mechanical axis would be the centerline from the outer cylindrical fringe of the lens or just its geometrical axis.

[b][url=http://www.lovelouisvuittonbags.co.uk/]louis vuittoun outlet[/url][/b] I did see the fake bags and sunglasses. I unintentionally stepped on my real Louis Vuitton glasses, and it absolutely was so shiny and sunny that I necessary sunglasses at once. I had been not around a boutique, and that i took at evaluate fake sunglasses. Are unable to fit all the things inside your price reduction luggage? Easy-go area saver sets will let you pack much more in less space. These ingenious compression bags clear away air that creates bulk just by squeezing and rolling. No vacuum cleaner needed! Would be the considered of protection heading by private items bothering you? You should not such as the assumed of putting your cleanse outfits in not so clean up lodge drawers? Packing cubes will resolve that dilemma.

[b][url=http://www.louisvuittonvipstore.co.uk/]louis vuitton handbags[/url][/b] The two primary areas are manage limited by an outsized synthetic leather-based shield, and that's sealed by zero and buckle closing made from golden metal tools. The on the lookout louis vuitton bag features relaxed round leather-based deal with and even a detachable adaptable content neck strap. Because you may perhaps have seen, the bag initialed or monogrammed cloth is adorned with apricot shaded natural and organic cowhide decrease.

[b][url=http://www.seekingbestbags.co.uk/]louis vuitton purses[/url][/b] 5. Head over to the Little Promises Courtroom office to serve a subpoena for the offending occasion (this will likely value about $10). This includes filling out a kind along with the party's identify and tackle. To be able to person a very items, you have to retail outlet in regards to vicinage furthermore to ask for your mouth watering notebook bag. Evidently, any time you drop by no less than a single purchase otherwise you do are only camping available as one on-line retail outlet, when selected the an individual you happen to be trying to find. So, be certain you greater your existing key things.

[b][url=http://www.louisvuittonvipstore.co.uk/]louis vuitton handbags[/url][/b] But though buying for these fashion add-ons a single shouldn't ignore the funds to buy these magnificent goods. Normally first designer bags expenses larger that a typical man fall short to pay. To contend with these designer bags, now louis vuitton reproduction can be found within the market place.